scholarly journals A New Algorithm for Digital Image Encryption Based on Chaos Theory

Entropy ◽  
2021 ◽  
Vol 23 (3) ◽  
pp. 341
Author(s):  
Yaghoub Pourasad ◽  
Ramin Ranjbarzadeh ◽  
Abbas Mardani

In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been suggested to improve secure image encryption schemes. Nowadays, chaotic methods have been found in diverse fields, such as the design of cryptosystems and image encryption. Chaotic methods-based digital image encryptions are a novel image encryption method. This technique uses random chaos sequences for encrypting images, and it is a highly-secured and fast method for image encryption. Limited accuracy is one of the disadvantages of this technique. This paper researches the chaos sequence and wavelet transform value to find gaps. Thus, a novel technique was proposed for digital image encryption and improved previous algorithms. The technique is run in MATLAB, and a comparison is made in terms of various performance metrics such as the Number of Pixels Change Rate (NPCR), Peak Signal to Noise Ratio (PSNR), Correlation coefficient, and Unified Average Changing Intensity (UACI). The simulation and theoretical analysis indicate the proposed scheme’s effectiveness and show that this technique is a suitable choice for actual image encryption.

Author(s):  
Edwin A. Umoh ◽  
Ogechukwu N. Iloanusi

Images are susceptible to degradation by noise from different sources as they undergo various processes. The effect of noise degradation affects the visual information fidelity, structural content and the decryption performance of an image encryption algorithm. In this paper, the effects of noise attacks on the performance of a hyperchaos-based digital image encryption algorithm is evaluated. In hyperchaos-based encryption algorithm, chaotic dynamics are used to encrypt the pixels of images. Two noise models, namely Gaussian noise and salt and pepper noise were added to test images, prior to encryption operations, in order to test for the robustness of the algorithm to noise attacks. The mean square error, peak signal – to – noise ratio, structural content and normalized correlation coefficient of the plain and decrypted images were evaluated. The results obtained indicated that noise has insignificant effect on the decryption performance of the algorithm, as the noise-degraded images and their decrypted counterparts were very identical. Thus, the image encryption algorithm is tolerant of noise and can therefore be used in noisy channels.


2011 ◽  
Vol 474-476 ◽  
pp. 1475-1478 ◽  
Author(s):  
Feng Ying Han ◽  
Cong Xu Zhu ◽  
Chang Sheng Liu

A compound Chaos encryption algorithm for digital images is designed in this paper. Lorenz Chaotic system and Logistics map are linked in cascade to generate Chaos sequences. Then the permutation matrix is constructed to encrypt the digital image. The new algorithm can expand the key space and improve anti-aggressive ability. Matlab7.0 is used for simulation testing of the image encryption. Experimental results show that the algorithm is feasible and it can satisfy the security requirement for image transmission and storage. The compound Chaos algorithm can be also used for color digital image encryption.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 535
Author(s):  
Karim H. Moussa ◽  
Ahmed I. El Naggary ◽  
Heba G. Mohamed

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, but the most secure and reliable schemes are those based on chaotic maps, due to the intrinsic features in such kinds of multimedia contents regarding the pixels’ high correlation and data handling capabilities. The novel proposed encryption algorithm introduced in this article is based on a 3D hopping chaotic map instead of fixed chaotic logistic maps. The non-linearity behavior of the proposed algorithm, in terms of both position permutation and value transformation, results in a more secured encryption algorithm due to its non-convergence, non-periodicity, and sensitivity to the applied initial conditions. Several statistical and analytical tests such as entropy, correlation, key sensitivity, key space, peak signal-to-noise ratio, noise attacks, number of pixels changing rate (NPCR), unified average change intensity randomness (UACI), and others tests were applied to measure the strength of the proposed encryption scheme. The obtained results prove that the proposed scheme is very robust against different cryptography attacks compared to similar encryption schemes.


2021 ◽  
Vol 55 (5) ◽  
pp. 490-499
Author(s):  
Zhong-xun Wang ◽  
Kai-yue Sha ◽  
Xing-long Gao

2017 ◽  
Vol 893 ◽  
pp. 012050 ◽  
Author(s):  
MT Suryadi ◽  
Maria Yus Trinity Irsan ◽  
Yudi Satria

2018 ◽  
Vol 2 (2) ◽  
pp. 175-195
Author(s):  
Raghad Yousif ◽  
Ayad Ismaeel

This paper presents a novel image encryption scheme based on extended largescale randomization key-stream generator. The basic form of the key-stream generator is presented, and employed in digital image ciphering. The modification of the basic form also, presented, and gives encouraging results in image encryption as compared with classical non-linear stream cipher generators and the basic form. Pixel shuffling is performed via vertical and horizontal permutation. Shuffling is used to expand diffusion in the image and dissipate high correlation among image pixels the sequences generated from all presented generators are introduced to five well-known statistical tests of randomness to judge their randomness characteristic. The ciphered images are tested for their residual intelligibility subjectively. The measures applied to images ciphered by one of the classical key-stream cipher generators (Threshold generator) for the purpose of comparison with the presented key-stream algorithms. Experiments results show that the proposed algorithm achieves the image security. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the proposed scheme shows a good resistance against brute-force and statistical attacks


Sign in / Sign up

Export Citation Format

Share Document